network access

Results 276 - 296 of 296Sort Results By: Published Date | Title | Company Name
Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
    
Intellitactics
Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines
    
Identity Engines
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
By redirecting traffic away from ISP outages and WAN link bottlenecks, Ecessa, with its PowerLink and ShieldLink family of affordable WAN Optimization Controllers help avoid critical WAN infrastructure problems. Ecessa optimizes WAN infrastructure as defined by 24/7 availability, high-performance, flexible scalability, and secure operations - while streamlining IT costs. PowerLink and ShieldLink simplify the management of network links, and optimize user access to datacenters and remote sites.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
    
BMC ESM
Published By: PC Mall     Published Date: Jul 08, 2010
Download this Cisco white paper to learn how to deliver a new workspace experience, connecting anyone, anywhere to any resource: securely, reliably and smoothly.
Tags : 
pcmall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection
    
PC Mall
Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
Published By: Cisco     Published Date: Sep 15, 2015
To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture.
Tags : 
unified computing system, virtualization, networking, storage
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
How can businesses capitalize on new wireless network capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)?
Tags : 
    
Cisco
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
    
Globalscape
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Aerohive     Published Date: Feb 17, 2015
This video shows how Aerohive Wi-Fi allows retailers to improve customer experience.
Tags : 
improve customer experience, aerohive networks for retailers, guest access, improve communication with customers
    
Aerohive
Published By: Aerohive     Published Date: Feb 17, 2015
This video shows how Aerohive Wi-Fi allows retailers to improve customer experience.
Tags : 
improve customer experience, aerohive networks for retailers, guest access, improve communication with customers
    
Aerohive
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS
Published By: LogRhythm     Published Date: Feb 07, 2017
In February 2016, the computer network at Hollywood Presbyterian Medical Center (HPMC) was down for more than a week as the Southern California hospital worked to recover from a ransomware attack. Hospital administrators declared an internal emergency as staff struggled to access patient records and computer systems critical for patient care.
Tags : 
    
LogRhythm
Published By: Juniper Networks     Published Date: Aug 10, 2017
In today’s business and IT landscape, the network is no longer simply a basic IT function. It is an essential business asset. The ability of your network users—whether they be employees, customers, or partners—to have fast, real-time access to online resources is directly correlated to financial success.
Tags : 
software as a service, platform as a service, infrastructure, cloud service provider, virtual data center, sdsn
    
Juniper Networks
Published By: Forcepoint     Published Date: Jul 30, 2019
How to boost results, cut costs and manage risk in an internet-connected world Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed?organizations are re-architecting their networks and security to move their most valuable data?and applications to the cloud, in order to give their users much richer, faster, less expensive?access than ever before. Enabling remote sites and off-network users to securely connect?direct-to-cloud is the new challenge facing enterprises and government agencies.? How can distributed organizations achieve the reliable, secure connectivity to the cloud they?need? Many are now using internet technologies?for connect all of their users to cloud-based applications more productively and cost-effectively than ever before. Join Forcepoint for this informative discussion. In this session we will cover: How to accelerate
Tags : 
    
Forcepoint
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.